Igor Santos
Orcid: 0000-0002-9511-8612Affiliations:
- University of Deusto, Bilbao, Spain
According to our database1,
Igor Santos
authored at least 87 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
2023
IEEE Access, 2023
2022
Evol. Intell., 2022
Best Practices and Scoring System on Reviewing A.I. based Medical Imaging Papers: Part 1 Classification.
CoRR, 2022
2021
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021
2020
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
2019
Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems.
Neurocomputing, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
The web is watching you: A comprehensive review of web-tracking techniques and countermeasures.
Log. J. IGPL, 2017
The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services.
Proceedings of the 26th International Conference on World Wide Web, 2017
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the IEEE Latin American Conference on Computational Intelligence, 2017
2016
Text normalization and semantic indexing to enhance Instant Messaging and SMS spam filtering.
Knowl. Based Syst., 2016
Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
Log. J. IGPL, 2016
Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying.
Log. J. IGPL, 2016
Data Is Flowing in the Wind: A Review of Data-Flow Integrity Methods to Overcome Non-Control-Data Attacks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the 23rd International Conference on Telecommunications, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the International Joint Conference, 2015
2014
Comput. Secur., 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Procedural Playable Cave Systems Based on Voronoi Diagram and Delaunay Triangulation.
Proceedings of the 2014 International Conference on Cyberworlds, 2014
2013
Opcode sequences as representation of executables for data-mining-based unknown malware detection.
Inf. Sci., 2013
Int. J. Secur. Networks, 2013
Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013
Comput. Informatics, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
2012
Expert Syst. Appl., 2012
Expert Syst. Appl., 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries.
Proceedings of the Database and Expert Systems Applications, 2012
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
IET Inf. Secur., 2011
Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Collective Classification for Unknown Malware Detection.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Social Innovation and Social Media, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the 2011 Database and Expert Systems Applications, 2011
Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the 8th Annual Collaboration, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Automatic Behaviour-based Analysis and Classification System for Malware Detection.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 2, AIDSS, Funchal, Madeira, Portugal, June 8, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010
2009
Proceedings of the Distributed Computing, 2009
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009
N-grams-based File Signatures for Malware Detection.
Proceedings of the ICEIS 2009, 2009
2008
Proceedings of the Enterprise Interoperability III, 2008
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008